Distributed key generation (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Distributed key generation" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
207th place
136th place
11th place
8th place
5,032nd place
3,357th place
1,185th place
840th place
580th place
462nd place

acm.org (Global: 1,185th place; English: 840th place)

dl.acm.org

berkeley.edu (Global: 580th place; English: 462nd place)

cs.berkeley.edu

doi.org (Global: 2nd place; English: 2nd place)

  • Kate, Aniket; Goldberg, Ian (2010). "Distributed Private-Key Generators for Identity-Based Cryptography". Security and Cryptography for Networks. Lecture Notes in Computer Science. Vol. 6280. pp. 436–453. CiteSeerX 10.1.1.389.4486. doi:10.1007/978-3-642-15317-4_27. ISBN 978-3-642-15316-7.
  • Boldyreva, Alexandra (2003). "Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme" (PDF). Public Key Cryptography — PKC 2003. Lecture Notes in Computer Science. Vol. 2567. pp. 31–46. doi:10.1007/3-540-36288-6_3. ISBN 978-3-540-00324-3. {{cite book}}: |journal= ignored (help)
  • Pedersen, T. P. (1992). "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing". Advances in Cryptology – CRYPTO '91. Lecture Notes in Computer Science. Vol. 576. pp. 129–140. doi:10.1007/3-540-46766-1_9. ISBN 978-3-540-55188-1.
  • Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal (24 May 2006). "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems". Journal of Cryptology. 20 (1): 51–83. CiteSeerX 10.1.1.134.6445. doi:10.1007/s00145-006-0347-3. S2CID 3331212.
  • Kate, Aniket; Goldberg, Ian (2006). "Distributed Key Generation for the Internet". IEEE ICDCS. doi:10.1109/ICDCS.2009.21.
  • Castelluccia, Claude; Jarecki, Stanisław; Kim, Jihye; Tsudik, Gene (2006). "Secure acknowledgment aggregation and multisignatures with limited robustness". Computer Networks. 50 (10): 1639–1652. doi:10.1016/j.comnet.2005.09.021.
  • Canny, John; Sorkin, Steve (2004). "Practical Large-Scale Distributed Key Generation". Advances in Cryptology - EUROCRYPT 2004 (PDF). Lecture Notes in Computer Science. Vol. 3027. pp. 138–152. CiteSeerX 10.1.1.69.6028. doi:10.1007/978-3-540-24676-3_9. ISBN 978-3-540-21935-4.
  • MacKenzie, Philip; Shrimpton, Thomas; Marcus, Jakobsson (2006). "Threshold Password-authenticated Key Exchange". Journal of Cryptology. 19 (1): 27–66. CiteSeerX 10.1.1.101.6403. doi:10.1007/s00145-005-0232-5. S2CID 1732140.

iacr.org (Global: 5,032nd place; English: 3,357th place)

iacr.org

eprint.iacr.org

psu.edu (Global: 207th place; English: 136th place)

citeseerx.ist.psu.edu

  • Kate, Aniket; Goldberg, Ian (2010). "Distributed Private-Key Generators for Identity-Based Cryptography". Security and Cryptography for Networks. Lecture Notes in Computer Science. Vol. 6280. pp. 436–453. CiteSeerX 10.1.1.389.4486. doi:10.1007/978-3-642-15317-4_27. ISBN 978-3-642-15316-7.
  • Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal (24 May 2006). "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems". Journal of Cryptology. 20 (1): 51–83. CiteSeerX 10.1.1.134.6445. doi:10.1007/s00145-006-0347-3. S2CID 3331212.
  • Canny, John; Sorkin, Steve (2004). "Practical Large-Scale Distributed Key Generation". Advances in Cryptology - EUROCRYPT 2004 (PDF). Lecture Notes in Computer Science. Vol. 3027. pp. 138–152. CiteSeerX 10.1.1.69.6028. doi:10.1007/978-3-540-24676-3_9. ISBN 978-3-540-21935-4.
  • MacKenzie, Philip; Shrimpton, Thomas; Marcus, Jakobsson (2006). "Threshold Password-authenticated Key Exchange". Journal of Cryptology. 19 (1): 27–66. CiteSeerX 10.1.1.101.6403. doi:10.1007/s00145-005-0232-5. S2CID 1732140.

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org